1. Special requirements of continuous monitoring in your chosen information system security domain in your chosen organization/industry if there are any.

Qualified Writers
Rated 4.9/5 based on 2480 reviews

100% Plagiarism Free & Custom Written - Tailored to Your Instructions

ITM527 MOD3 SLP: Business Continuity and Disaster Recovery for Operations and Physical Security domain

INSTRUCTIONS:

Module 2 - SLP
Continuous Monitoring
The following example demonstrates how to apply continuous monitoring technical reference model to a particular risk management domain. Please read the following article and identify a few key lessons learned from it in relation to what principles and methods you have learned in the case assignment.
NIST (2011). Applying the Continuous Monitoring Technical Reference Model to the Asset, Configuration, and Vulnerability Management Domains.
Practicing continuous monitoring fundamentals, processes, etc. to one`s own experiences offers an opportunity to apply what you`ve learned to the real world. Can you choose a particular information system security domain of your organization or industry and apply what you learned from the case readings and SLP examples? You can choose to assess comprehensively, or you can choose not to cover all the aspects of continuous monitoring but focus on two or three major perspectives and go much more in depth. You can choose the same security domain in the previous SLP assignment in this course, or start with a new one.
SLP Assignment Expectations
Please write a 2- to 5-page paper titled:
"Continuous Monitoring for ______ (your chosen information system security domain in your chosen organization/industry): Challenges and Solutions"
Please address the following issues:
1. Special requirements of continuous monitoring in your chosen information system security domain in your chosen organization/industry if there are any.
2. Two or three major perspectives of continuous monitoring that you choose to go in depth to discuss.
3. One or two major lessons learned from the example that you`d like to apply in your own continuous monitoring issue here.
4. Key challenges and solutions of continuous monitoring.
• Please use original writing (No Plagerism)
• Please use American URLs than can be easily verified on the web on the reference page.
• Please include the page numbers in the references
• Read then background material in the attachment titled Background
• My Organization is US Department of Defense 

CONTENT:

Business Continuity and Disaster Recovery for Operations and Physical Security domain Name: Institutional Affiliation: Business Continuity and Disaster Recovery for Operations and Physical Security domain In the US Department of Defense, physical and operations security domains are the most imperative domains in their information system. According to Craig (2012), the information system domain of physical security entails the security field, the surroundings of the information systems and its associated countermeasures of physical protection of the system. By definition, data recovery is the process of retrieving data after an occurrence of a calamity or hazard that led to losing data. Other than having a secure environment, information in the Department of Defense is vulnerable to threats from viruses, worms, and other attacks through hacking. On the other hand, business continuity entails the continuation of the normal operation of an organization after being affected by an external or internal calamity. The information sy

...
 

Price: £99

100% Plagiarism Free & Custom Written - Tailored to Your Instructions